Question 1: A multinational healthcare organization processes sensitive patient data subject to HIPAA and GDPR. A network engineer reviews the security implications tied to cloud architecture models as the company plans to move data off-premises at the end of the year. What model provides flexibility by allowing the company to store sensitive data to a private cloud infrastructure and non-sensitive information on a public cloud infrastructure?
Question 2: A chemical plant system collects data from thousands of sensors to analyze trends, optimize processes, and generate compliance reports over months and years of operation. Which ICS component performs this function?
Question 3: A smart home device manufacturer releases a product with no update mechanism, weak default passwords, and no security testing. How would a security consultant best explain this risk to senior management?
Question 4: A financial services firm is migrating from a traditional network architecture to Zero Trust. Their current setup allows users full network access once they connect via VPN, enabling lateral movement after credential theft. They need to implement Zero Trust without degrading user experience, ensuring that accessing a sensitive database requires device health verification, not just at the network perimeter. Which implementation strategy achieves this deperimeterization?
Question 5: A developer wants to deploy a web application written in Python without managing the underlying operating system patches, web server software, or load balancers, focusing only on the application code and configuration. Which service model best fits this scenario?
Question 6: An IoT sensor deployed in a remote agricultural field has only 8KB of RAM and limited battery power supplied from a small solar panel. What is the security impact of this configuration?
Question 7: A cloud architect is designing a globally distributed application that must maintain 99.99% availability even during regional disasters. The application processes user data that must remain within the European Union per GDPR data sovereignty requirements. Which combination of cloud resiliency features and architectural decisions satisfies both the availability SLA and legal compliance?
Question 8: An organization uses multiple Cloud applications like Office 365 and Salesforce. They want to deploy a security solution between their users and these Cloud services to monitor data transfers, enforce DLP policies, and detect unauthorized Cloud usage. What is the best solution?
Question 9: A company implements a security architecture where no user or device is trusted by default, requiring continuous verification of identity and device health before accessing any resource, regardless of whether the connection originates from inside the network perimeter or outside. Which model is this?
Question 10: A company using a multi-tenant SaaS email solution discovers that a vulnerability in the provider's infrastructure exposed data from multiple customers. The provider claims they patched the underlying infrastructure, but the customer is concerned about risks in shared environments. Which migration strategy best addresses the residual risk of multi-tenancy hosting while maintaining the benefits of Cloud email services?
Question 11: A water treatment facility needs an operating system that guarantees response times within microseconds for critical valve control, where missing a deadline could cause catastrophic physical damage. Which system is required?
Question 12: An attacker exploits a known vulnerability in a smart building thermostat that the manufacturer stopped supporting two years ago, leaving no security patches available. Which embedded system risk factor does this illustrate?
Question 13: During a Black Friday sale, an online retailer automatically provisions 50 additional servers when CPU utilization hits 75%, then automatically decommissions them when traffic returns to normal after the event. Which Cloud characteristic enables this automatic scaling down?
Question 14: A municipal government shares a specialized Cloud infrastructure with other state agencies to manage emergency response systems, sharing costs while maintaining strict isolation from commercial Cloud users. Which deployment model best describes this arrangement?
Question 15: An ICS recently suffered a ransomware attack because the HMI was on the same flat network as corporate IT systems and workstations. Which architecture properly segments the HMI while maintaining its ability to receive data from sensors?
Question 16: A company wants to use a fully managed email service where they only manage user accounts and mailboxes, while the provider handles all server maintenance, patching, and software updates. Which Cloud service model is this?
Question 17: An organization implements manual policies for their e-commerce platform administrators. During a sale, the administrators scaled up the system but failed to scale down after 48 hours when traffic normalized, leaving 500 expensive GPU instances running idle. Which Cloud concept would help the organization with this type of incident?
Question 18: A Zero Trust architecture requires continuous verification of device health before granting access to sensitive resources. A user attempts to access the ERP system from a personal laptop that has not received OS security patches for six months and lacks endpoint protection. Which component of the Zero Trust framework should detect this condition and enforce policy?
Question 19: A retail company maintains sensitive customer payment data in an on-premise data center to meet compliance requirements, but uses a public cloud provider to host their e-commerce website which handles traffic spikes during holidays. The two environments are connected to allow data synchronization. What is this deployment model called?
Question 20: In a shared responsibility model using Infrastructure as a Service (IaaS), which task is typically the responsibility of the Cloud Service Provider (CSP)?